equalitie / shodan_fingerprinterLinks
Script fingerprinting systems based on shodan.io data
☆12Updated 7 years ago
Alternatives and similar repositories for shodan_fingerprinter
Users that are interested in shodan_fingerprinter are comparing it to the libraries listed below
Sorting:
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Updated 4 years ago
- ☆33Updated last year
- A rogue DNS detector☆24Updated 2 months ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Unofficial API & Client for dnsdumpster.com and hackertarget.com☆67Updated 6 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Updated 4 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Port Crawler Pythonized☆19Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Updated 4 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16Updated 8 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 3 months ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28Updated last year
- Low Interaction Mobile Honeypot☆96Updated 7 months ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- bap - http Basic Authentication honeyPot☆53Updated 11 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Updated 3 weeks ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago